The incident was first reported on May 12 and within a few hours, the WannaCry Ransomware had locked 75,000 cyber attacks in 75 countries demanding a random of Dollars 300 to 600 from the users to give access to them. Bad guys generally target Windows far more than Apple's operating system because there are vastly more computers running Windows around the world.
The WannaCry ransomware itself is promulgating as a worm through networks worldwide.
"The problem is that there are a lot of Windows computers out there that either don't have automatic updates enabled or are so outdated that Microsoft has stopped providing security updates altogether", Vox said. Most of the cyber attacks were reported from Taiwan and the countries that were affected by it include Russia, India, Spain, Turkey, Vietnam, the Philippines, Japan, the U.S., China, Spain, and Italy. Both China and Russian Federation have pointed out that the United States government is partially to blame, since the ransomware was developed from a snooping tool used by its National Security Agency (NSA), then discovered by hackers and shared online in April.
New Automatic Teller Machines (ATMs) with Microsoft's Windows 10, however, were not affected by the ransomware.
Attention has been drawn to the fact that the British Government ended a contract with Microsoft to provide support for the already old Windows XP operating system (OS) - widely in use across the NHS during those years.
Indeed, there have been no reports of anyone getting their files back, despite almost 170 payments (about United States $50,000 at the time of writing) having been made to the bitcoin wallets associated with the ransomware.
Cybersecurity experts say there is circumstantial evidence that links the WannaCry attack, which started Friday in Europe and then spread around the globe, to cyberattacks previously tied to North Korea. It effectively takes the computer hostage and demands a US$300 ransom, to be paid in 72 hours with bitcoin. "You will be saving something small and risking something big". Some security researchers speculated that if the perpetrators were North Korean, the goal may have been to cause a widespread internet outage to coincide with this weekend's latest missile test. But in this case, according to Kaspersky Lab, the shared code was removed from the versions of WannaCry that are now circulating, which reduces the likelihood of such a "false flag" attempt at misdirection.
While the volume-pricing deal with Microsoft was eventually cancelled, the responsibility for the software (and any updates) was not removed from users or managers. This leaves them vulnerable to the exploit enforced by WannaCry, which was patched by Microsoft earlier this year in March. Install Microsoft's patch. 3.
"We believe the recent ransomware attack could accelerate the Windows upgrade cycle for enterprises".